You are on page 1of 2

WHAT IS CYBERSECURITY?

– A BEGINNER’S GUIDE TO CYBERSECURITY WORLD


Cybercrime is a global problem that’s been dominating the news cycle. It presents a threat to
individual security and an even bigger threat to large international companies,
banks, and governments. Today’s organized cybercrimes are way over lone
hackers of the past now large organized crime rings function like start-ups and
often employ highly-trained developers who are constantly innovating online
attacks. With so much data to exploit out there, Cybersecurity has become
essential. Hence, I decided to write up this blog on “What is Cybersecurity?”
Why we need Cybersecurity?
It can be rightfully said that today’s generation lives on the internet, and we general users are almost
ignorant as to how those random bits of 1’s and 0’s reach securely to
our computer. For a hacker, it’s a golden age. With so many access
points, public IP’s and constant traffic and tons of data to exploit,
black hat hackers, are having a whale of a time exploiting
vulnerabilities and creating malicious software for the same. Above
that, cyberattacks are exploit by the day. Hackers are becoming
smarter and more creative with their malware and how they ignore
the rules of virus scans and firewalls still frustrates many people.
Therefore, it is necessary some sort of protocol that protects us against all these cyberattacks and
makes sure our data doesn’t fall into the wrong hands. This is exactly why we need cybersecurity.
Types of Cyber Attacks

What is Cybersecurity?
Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs and
data from attack, damage or unauthorized access.
From a computing point of view, security includes cybersecurity and physical security — both are used
by companies to protect against unauthorized access to data centers and other computerized systems.
Information security, which is designed to maintain the confidentiality, integrity, and availability of data,
is a subset of cybersecurity. The use of cyber security can help prevent cyberattacks, data breaches,
and identity theft and can aid in risk management.
So, when talking about cybersecurity, one might ask yourself “What are we trying to protect ourselves
against?” Well, there are three main aspects we are trying to control:
• Unauthorised Access
• Unauthorised Deletion
• Unauthorised Modification

These three terms are synonymous with the very commonly known CIA triad which stands for
Confidentiality, Integrity, and Availability. The CIA triad is also known as the three pillars of security and
most of the security policies of an organization are built on these three principles.
The CIA Triad
The CIA triad which stands for Confidentiality, Integrity, and Availability is a design model to guide
companies and organizations to form their security policies. The components of the triad are
considered to be the most important and fundamental components of security. So let me brief you all
about the three components.
Confidentiality
Confidentiality is the protection of personal information. Confidentiality
means keeping a client’s information between you and the client, and not
telling others including co-workers, friends, family, etc.
Integrity
Integrity, in the context of computer systems, refers to methods of
confirming that data is real, correct and protected from unauthorized
user modification.
Availability
Availability, in the context of a computer system, refers to the ability of a
user to access information or resources in a specified location and in the
correct format.

You might also like